Kenna Blog
Thoughtful perspectives on Modern Vulnerability Management.
Power Couple: Kenna’s Vulnerability Intel + ServiceNow Vulnerability Response
Every once in a while, two things come together and create something new. Abbott and Costello. Johnny and June. Fred and Ginger. The whole becomes greater than the sum of its parts.
Read MoreSign up to get the latest updates
Threat Intelligence
By the Numbers: 2022 CVE Data Review
To help organizations improve their vulnerability management strategies, we've rounded up some key 2022 CVE data findings.
READ MORE
Cybersecurity Best Practices
The 5 Remediation Metrics Your Program is Missing
Discover the five metrics you need to quantify how well your organization is managing threats and drive down risk.
READ MORE
Trending Vulns
January Vuln of the Month: CVE-2022-44698
A Windows vulnerability that has the potential to cause headaches for Microsoft shops that aren’t up to date on their patches.
READ MORE
Risk-Based Vulnerability Management
New Year, New Public Sector Vulnerability Management Goals
Start 2023 off right and make these critical changes to your vulnerability management program to achieve compliance with CISA BODs.
READ MORE
Company News
May 2023 Be Your Year of Resilience
As the stakes continue to rise, the need for organizational and security resilience is at an all-time high.
READ MORE
Kenna API
API Guy: Uploading a File to a Connector
Our very own API guy unpacks how to upload a file to a connector and a new Python CSV to Kenna Data Importer (KDI) JSON.
READ MORE
5 Things Every CIO Should Know About VM
Read this eBook to learn what a modern vulnerability management approach means to your IT operation. You discover how it helps CIOs like you create more efficient and effective teams while reducing your company’s overall risk profile.
Download NowTrending Vulns
DECEMBER Vuln of the Month: CVE-2022-41128
A serious Windows vulnerability is December’s Vuln of the Month. Ready why this RCE scripting vuln can do a lot of damage.
READ MORE
Kenna API
API Guy: Extracting Talos Zero Day Information via Kenna APIs
The Kenna Security API Guy is back to explain exactly how to extract zero day Talos information using Kenna APIs.
READ MORE
Cybersecurity Best Practices
Common Hurdles That Hamstring Vulnerability Management Maturity—And How to Overcome Them
Two key capabilities will help you evolve your vulnerability management program, lower your risk posture, and achieve remediation nirvana.
READ MORE
Cybersecurity Best Practices
Logins in a Dangerous Time: How Organizations Are Navigating Cyberwarfare
We’ve gathered three key findings from Duo’s Trusted Access Report to help security leaders make future-defining decisions.
READ MORE
Cybersecurity Best Practices
Want Less Cyber Stress This Holiday Season? Do These 4 Things.
For a less stressful holiday season, here are four critical musts to have in place, especially when you're OOO.
READ MORE
Threat Intelligence
Level Up Risk Visibility with New Kenna.VI+ Updates
Kenna.VM Premier—the most robust tier of our risk-based vulnerability management platform—is live today! Here's what it can do for you.
READ MORE